Sciweavers

52 search results - page 5 / 11
» Security Analysis of the Gennaro-Halevi-Rabin Signature Sche...
Sort
View
CRYPTO
2009
Springer
150views Cryptology» more  CRYPTO 2009»
14 years 2 months ago
Short and Stateless Signatures from the RSA Assumption
We present the first signature scheme which is “short”, stateless and secure under the RSA assumption in the standard model. Prior short, standard model signatures in the RSA...
Susan Hohenberger, Brent Waters
ACNS
2007
Springer
129views Cryptology» more  ACNS 2007»
14 years 1 months ago
Gradually Convertible Undeniable Signatures
In 1990, Boyar, Chaum, Damg˚ard and Pedersen introduced convertible undeniable signatures which limit the self-authenticating property of digital signatures but can be converted b...
Laila El Aimani, Damien Vergnaud
TCC
2012
Springer
226views Cryptology» more  TCC 2012»
12 years 3 months ago
On the Instantiability of Hash-and-Sign RSA Signatures
The hash-and-sign RSA signature is one of the most elegant and well known signatures schemes, extensively used in a wide variety of cryptographic applications. Unfortunately, the o...
Yevgeniy Dodis, Iftach Haitner, Aris Tentes
CCR
2007
115views more  CCR 2007»
13 years 7 months ago
Analysis of the SPV secure routing protocol: weaknesses and lessons
We analyze a secure routing protocol, Secure Path Vector (SPV), proposed in SIGCOMM 2004. SPV aims to provide authenticity for route announcements in the Border Gateway Protocol (...
Barath Raghavan, Saurabh Panjwani, Anton Mityagin
CORR
2010
Springer
138views Education» more  CORR 2010»
13 years 7 months ago
The Digital Signature Scheme MQQ-SIG
Abstract: This document contains the Intellectual Property Statement and the technical description of the MQQ-SIG - a new public key digital signature scheme. The complete scientif...
Danilo Gligoroski, Svein Johan Knapskog, Smile Mar...